Field of the Invention
[0001] The present invention relates to a text based invitation method for inviting people
to a telephony conference or a chat session over a mobile communication network
Background of the Invention
[0002] Traditional conference calls/bridges have been set up through a user requesting a
Conference Bridge Number and PIN. Typically the conference bridge number is the same,
but the PIN is always different. The PIN's are allocated typically by a network administrator.
All participants dial into the conference bridge, and then are prompted for a PIN
to join the conference bridge.
[0003] The use of PIN number is seen as a barrier to the general public making use of conference
calls. This is particularly true with mobile phones, where once the user has dialled
the conference number, the PIN is no visible on the screen and so the user would have
to memorised the PIN or written it down first (e.g. if the PIN were shown in an SMS
or Email as the messaging application is no longer visible on the screen).
[0004] There are some alternative methods for setting up a conference bridge for mobile
subscribers that use text messaging. Also there are Mobile Applications (JAVA or Symbian)
that can be installed on some phones which are used to set up conference calls with
a combination of packet based interactions (over GPRS) to set up a conference bridge.
Current text based methods work in the following manner:-
[0005] Mobile Subscriber decides to organise a conference and sends a text message into
the conference facility number containing all the participants phone numbers that
want to be invited to the conference
[0006] Here the conference facility either out dials all participants, or the conference
facility invites participants to dial into the conference using a text message invite
from the organiser's number. Here single Conference Number used and recognition of
participants is based on Caller ID
[0007] The Application based solution requires handsets to be JAVA or Symbian v3 compliant
as a minimum:
[0008] Here the mobile Subscriber decides to organise a conference, opens up the conference
calling application on the handset. Then the subscriber selects from their contacts
the participants or add in numbers manually and activates the "start conference" facility
to invoke conference.
[0009] The conference facility either out dials all participants, or invites participants
to dial into the conference using a text message invite from the organiser's number.
[0010] The above methods for setting up conference sessions, or group chat is not commonly
used by mass market subscribers as the invitation method is not simple or straightforward.
Therefore an invitation to conference calling implemented by simple means is desired.
Summary of the Invention
[0011] Accordingly the present invention provides a method of implementing a multiparty
conference call in a mobile communications network comprising the steps of initiating
a conference call by sending a message to the network operator by a user requesting
a conference call to be set up; setting up a conference bridge for the requested conference
call by the operator; sending the user a message containing the identifier for the
conference bridge; forwarding the identifier message received by the user from the
operator to invitees to the conference call; and activating the identifier by the
invitees to join in the conference call.
Brief description of the accompanying drawing:
[0012] Figure 1 is a flow chart depicting the method of implementing a conference call according
to the present invention.
[0013] Figure 2 is a flow diagram showing an example implementation of a conference call
using the method according to the present invention.
Detailed description of the Invention:
[0014] The text based invitation for group chat is an alternative method to set up a conference
bridge compared to the methods known in the prior art.
[0015] Although this invention does not exclude the use of PINs for joining calls (where
higher security is required), it is a further aim of this patent to make use of alternative
safeguards to provide some security and therefore reduce the risk of uninvited participant
joining calls.
[0016] This invention is primarily aimed at simplifying the process of setting up a conference
call and in doing so making conference calls easier for the general public to use.
Most systems today are aimed at business users. One aspect of this is that for the
need participants to enter a PIN to enter the conference calls is removed given that
absolutely confidentiality of the call is not as significant issue for general chat
and instead measures are taken to reduce the probability of uninvited participants
either accidentally or deliberately joining the calls.
[0017] Using a text message based scheme, a subscriber will request a conference/chat bridge
to the network, the result of which will be a return text message response from the
network containing a specific conference bridge number (typically E.164 format); this
is then forward on (using a subsequent text message) to parties invited to the chat
session where the conference bridge number is used to dial into.
[0018] The main distinction with the prior art is the two phase text based invite, which
allows the service to be used by any subscriber that supports text messaging (typically
GSM/3GSM subscribers). The organising party, and connecting parties must have a terminal
that supports SMS/MMS text messages and voice calling or an for using the method disclosed
in the present invention.
[0019] A group call/chat conference platform will need to be created. This will need to
support an SMS or MMS text messaging based interface (MAP, SMTP, UDP), and also perform
the voice based chat facility. Therefore support of ISUP (ISDN User part) and ability
to handle voice calls is preferred to be implemented
[0020] The primary embodiment for the method of invitation to a conference call according
to the present invention can be implemented in the following manner:-
Figure 1 shows a simple flow chart depicting the various steps involved in the present
invention.
Mobile Subscriber 'A' decides they would like to set up a conference call with a number
of friends. 'A' sends a text message to a shortcode of the Conference Chat Facility.
The Conferencing Chat Facility sets up a conference bridge for 'A' and his/her invited
parties ready to be used.
[0021] 'A' receives an initial text message explaining the Conference Chat Facility and
the use of validating participants and other options, and that a follow up text message
is about to be sent for the chat session that 'A' can forward to the participants.
An example of the contents of the initial text therefore could be:
'Group Chat! You will be sent a text shortly to forward to your Chat members. When
in the chat session press 5 for further details. Full details of Group Chat at http://www.three.co.uk/groupchat/'
'A' then receives the invite text message. An example of the contents of this text
message could be :
'Invite for a chat session - Call +447782065432(or any other telephone number from a pool) to join now!.'
[0022] Standard mobile charges could be billed for such calls made using the present invention
.The number in the text message is from a large Conference Pool of numbers which are
assigned at random, and have a reuse time e.g. a number of days, to minimise unwanted/accidental
calls into a conference.
[0023] 'A' forwards/sends this text message to the friends ('B', 'C', 'D', 'E') phone numbers
(could be taken from contacts). On most mobile phones, an option exists to select
multiple recipients of a forwarded or composed SMS message. In this case, the user
interface task user 'A' has to undergo to forward the invitation to all invitees is
simplified.
[0024] 'B', 'C', 'D' and 'E' receive text message
from: 'A', an example of the received contents could be as follows:
'Invite for a chat session - Call +447782065432 to join now'
[0025] 'A', 'B', 'C', 'D' and 'E' select the Use Number option in their SMS menu and dial
the Conference Pool number. It may be possible that a recorded message may be audible
to them when dialling in. For example, they may hear
'Welcome to your chat session, You are the Nth caller to join. You will join at the tone'. .... Etc.
[0026] The new participant joining is also announced to all the parties currently in the
conference. Some conferencing solutions also ask users to record their name, so that
their arrival in the conference can be announced; in the case that no PIN is needed
to join the call, announcing participant's arrival will help identify situation where
a non-invited participant tries to join. Conference chat takes place between all participants.
[0027] A tone or announcement may sound when a new caller comes into the chat session, and
a different tone or announcement will sound when someone leaves by hanging up.
[0028] An example of an application using the present invention can be seen in figure 2.
[0029] There is a possibility in the present invention wherein the conference call initiating
party could be financially rewarded by the mobile network operator if more participants
join the conference call.
[0030] Pressing the numbers on the phone (resulting in DTMF (Dual Tone Multi-Frequency )
tones picked up by the conference platform) could result in one of the following actions:-
Press 1 = Announcement "There are 'N' participants in the chat session"
Press 2 = Announcement "The phone numbers of participants on the call are, (Caller
A's number, Caller B's number, Caller C's number... etc)"
Press 3 = Mute
Press 4 = Un-Mute
Press 5 = Announcement "Welcome to group chat, here are your options, Press 1 to hear
the number of callers on this chat session, Press 2 to hear the phone numbers of the
callers on this chat session, press 3 to mute your line, press 4 to un-mute your line,
press 5 to hear these options again.
[0031] Other number assignments are clearly possible.
[0032] Optionally the conference platform could send another to the conference organiser
once the chat session has completed (or the allocated pool number has expired) informing
the organiser that the number is no longer valid.
Characteristics of the conference pool of numbers assigned to the conference calling
facility :
[0033] The numbers will not be assigned directly to customers (i.e. MSISDNs in a mobile
network). The numbers will fall into one of three categories
- Ready for allocation to a conference session (In Pool - Non dialable)
- Allocated for use (Dialable now)
- Quarantined as used (Has been used in a conference call in the last [n] weeks - Non
Dialable)
[0034] Quarantine period starts as soon as the number has been used once in a conference
call. An allocated conference pool number will be valid to use once for a predetermined
time period either set by a network operator or agreed between the operator and the
party initiating the conference, e.g. for 24 hours.
[0035] After a conference pool number has been used once, it enters quarantine.
[0036] A used conference pool number can be defined as either a conference pool number that
has been connected into by two or more users, and all users release i.e. hung up or
can be understood as a conference pool number that has been requested to be used,
but has not been dialled for 24 hours from the request time.
[0037] Once a conference pool number's quarantine period expires, it is put back to 'In
Pool' status. If a conference pool number is dialled and it is in 'In Pool' or 'Quarantined'
status - then a recorded announcement may be played which states that the number dialled
is not in use.
[0038] The choice of limiting conference reservation to the next 24hours is arbitrary; if
user feedback suggested that consumer frequently want to set-up call more than 24hours
in advance, this could easily changed, although the dimensioning of phone numbers
pool would need to be adjusted accordingly.
Dimensioning the phone number pool size.
[0039] It is preferred to ensure the pool of phone numbers that can be allocated is significantly
larger than the number of conference calls the system is expected to reserve. The
dimension needs to take in to account two factors,
Factor 1:
[0040] Deliberate eavesdroppers willing to dial the numbers in the allocated number range.
If the design criteria were that there should be less than 1:1000 chance of an eavesdropper
successfully finding a number in use, and the service provider expects a maximum of
1000 allocated calls at any one time, then the service provider would need to reserve
1m phone numbers. However if the solution required a pool of numbers much greater
than 100,000 to 1, then it may become progressively more difficult to obtain a large
number pool from regulators or other assignment authorities.
[0041] To help reduce attack by deliberate eavesdroppers, the conference bridge may optionally
look for suspicious incoming calling patterns including
- high incidence of calls to non-allocated numbers in the pool
- callers trying number sequentially
- multiple calls to different numbers from the same CLI (caller line identification)
[0042] On detecting a suspicious calling pattern, the conference bridge may choose to block
further calls from the identified CLI. Where the CLI isn't known, it could additionally
choose to divert the call to operator or automated answering software offering to
assist the user, or request help from the network operators in tracing the malicious
calling party.
[0043] A complementary solution (where allowed by the Regulator) would be to ensure all
numbers in the range are answered i.e. by incurring a cost to the calling party for
dialling unallocated numbers and reducing the probability of finding an allocated
number, the economics may deter the deliberate eavesdropper.
Factor 2:
[0044] Accidental eavesdroppers e.g. an invitee tries to use the number they've received
a week later. The probabilities of this number being allocated at the time they call
is remote providing that the reserved phone number is large. However there could be
a significant number of accidental eavesdroppers attempts e.g. if many users accidentally
press on old SMS messaging in their phone's inbox. This problem can be modelled in
statistical maths in a manner similar to the well-known 'Birthday Paradox' which models
the possibility of finding matching pairs of numbers (equivalent to birthday dates)
in a larger pool of numbers (equivalent to days in a year).
[0045] A number of measures can be put in place to help reduce the risk of accidental eavesdroppers.
These include
- not activating an allocated number conference until at least two participants dial
in concurrently. In this case, the first invitee to dial in will be put on hold until
another joins. The probability of an accidental caller dialling in at the same time
as another participant is thereby much reduced.
- not activating an allocated number conference call until the organiser joins the call.
In this case, all invitees that have already dialled in will be on hold until the
organiser joins. The probability of an accidental caller dialling in at the same time
as the organiser is thereby much reduced. A further advantage is requiring the organiser
to be present is that there is little risk of invited callers consuming the conference
call in the act of dialling in (to activate the conf call), realising it hasn't started
and hanging up to dial back later.
[0046] The advantage of the solution offered by the above disclosed invention is that the
simple nature of the text based Conference Chat Invitation, which is an improvement
to the currently available methods described in the 'background' section , and will
be taken up in a greater manner by the mass market mobile subscriber community.
1. A method of implementing a multiparty conference call in a mobile communications network
comprising the steps of:
- sending a text message to the network operator by a user requesting a conference
call to be set up;
- setting up a conference bridge for the requested conference call by the operator;
- sending the user a text message containing the identifier for the conference bridge
;
- forwarding the identifier message received by the user from the operator to invitees
to the conference call; and
- dialling the identifier to join in the conference call.
2. The method as claimed in claim 1 wherein SMS and/or MMS based text-messaging services
are used for transmitting messages over the communication network.
3. The method as claimed in claims 1 and 2 wherein the indicator is a telephone number,
which is not assigned for normal customer use.
4. The method as claimed in claims 1 to 3 wherein the indicator a temporary indicator
for the conference call and is only valid for a pre-determined period of time.
5. The method as claimed in claims 1 to 4 wherein the indicator is selected by the operator
from a pool of indicators for used for conference calling.
6. The method as claimed in claims 1 to 5 wherein the indicators in said pool are monitored
at intervals to prevent eavesdropping by non- invitees.
7. The method as claimed in claim 6 wherein said pool is monitored for suspicious calling
patterns.
8. The method as claimed in claim 6 wherein eavesdropping is prevented by delaying activation
of the indicator until the user who requested the conference call dials the indicator.
9. The method as claimed in claim 6 wherein eavesdropping is prevented by delaying activation
until at least two invitees to the conference call dial the indicator concurrently.